Researchers break into Windows encryption feature

With effort, hackers are able to break into an encryption feature available on newer versions of Windows.

security code

Researchers can break into BitLocker, the disk encryption feature available in Windows 7, Vista and Server 2008.

German experts from the Franhofer Institute for Secure Information Technology (SIT) revealed five attack strategies against BitLocker and the way its Trusted Platform Module (TPM) sealing mechanism works.

In certain circumstances, the researchers claim that dedicated hackers could "circumvent the protection and break confidentiality with limited effort".

"Our attacks neither exploit vulnerabilities in the encryption itself nor do they directly attack the TPM," the researchers claim in a report.

Advertisement - Article continues below
Advertisement - Article continues below

"They rather exploit sequences of actions that Trusted Computing fails to prevent, demonstrating limitations of the technology."

One attack took advantage of the boot process, where BitLocker needs to interact with the user to obtain a password or a key file from a USB memory stick, or both.

The program code interacting with the user is unencrypted, so an attacker with physical access is able to modify it.

The hacker could replace the original BitLocker boot code with a manipulated version, and spoof the user interaction with BitLocker.

The researchers made it clear that that they were using targeted attacks', where an attacker would devote considerable effort in trying to access data on a disk, for example in corporate espionage.

BitLocker is better designed to withstand real-world opportunistic attacks' for example, if a computer was stolen and somebody was trying to access the data to see what they could get.

Advertisement - Article continues below

Paul Cooke from Microsoft confirmed as much in a blog post. He said: "This research is similar to other published attacks where the owner leaves a computer unattended in a hotel room and anyone with access to the room could tamper with this computer.

"This sort of targeted attack poses a relatively low risk to folks who use BitLocker in the real world."

He added: "These sorts of targeted threats are not new and are something we've addressed in the past; in 2006 we discussed similar attacks, where we've been straightforward with customers and partners that BitLocker does not protect against these unlikely, targeted attacks."

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now


Microsoft Windows

Windows 7 security patches officially coming to an end

21 Mar 2019
Microsoft Windows

The IT Pro Podcast: Farewell Windows 7

17 Jan 2020
Microsoft Windows

Windows 7 ends: what do you do next?

4 Jan 2020
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019

Most Popular

Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
data governance

Brexit security talks under threat after UK accused of illegally copying Schengen data

10 Jan 2020
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020

Dell XPS 13 (New 9300) hands-on review: Chasing perfection

14 Jan 2020